VIRDI 4000 TM User’s Manual 4UNION COMMUNITY Co., Ltd. 44-3 Hyundai Topics Building, Bangi-dong,Songpa-gu, Seoul, Korea 138-050, Tel: 82-2-6488-3000, Fax: 82-2-6488-3099,E-Mail:sales@unioncomm.co.kr, http://www.unioncomm.co.kr/eng< Glossary> Admin, Administrator- A user who can enter into the terminal menu mode. They canregister/modify/delete terminal users and change the operating environmentby changing settings.- If there is no administrator for a terminal, anyone can change the settings. Inthis regard, it is recommended you register at least one administrator.- Caution is required with registration and operation because an administratorhas the right to change critical environmental settings of the terminal. 1 to 1 Verification- A user’s verification fingerprint (template) is compared to the user’s enrollmentfingerprint (template) previously registered. The terminal performs 1:1matches against the user’s enrolled template until a match is found.- It is called 1 to 1 Verification because only the fingerprint registered in theuser’s ID or card is used for comparison. 1 to N Identification- The terminal performs matches against multiple fingerprints (templates) basedsolely on fingerprint information.- Without an ID or card, the user’s fingerprint is compared to fingerprintspreviously registered. I-Capture (Intelligent Capture)- Reinforces detection capability for residual fingerprints (fingerprints left on asensor window due to sweat or contaminants on a finger) and automaticallyadjusts sensor settings to detect good-quality fingerprints regardless of theconditions (dry or wet) of the fingerprints. Authentication Level- Depending on the fingerprint match rate, it is displayed from 1 to 9.Authentication is successful only if the match rate is higher than the set level.- The higher the Authentication level, the higher the security. However, itrequires a relatively high match rate, so Authentication is vulnerable to failure.- 1:1 Level: Authentication level used for 1:1 verification.- 1:N Level: Authentication level used for 1:N identification. Authentication Method- Various kinds of authentication including FP (fingerprint) authentication, PW(password) authentication, RF (card) authentication, or a combination of thesemethods.- Example: FP/PW: fingerprint or password authentication; password is used forauthentication if fingerprint authentication fails.